Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 11:48

General

  • Target

    c6ffa7074b4b0bcda78e5649a60a25f48f80cbb6d71341eba9e33699a3450609.exe

  • Size

    698KB

  • MD5

    1d9edd70b0c7f551e9d77a951081b857

  • SHA1

    3bac803b79eb5da4276e64c63c9b9a9b1895aedc

  • SHA256

    c6ffa7074b4b0bcda78e5649a60a25f48f80cbb6d71341eba9e33699a3450609

  • SHA512

    8f8e13b0629ef464dae8d84dc0d95b11ff00ae9d308591de523ae56cb86f38197cf47c2e044debb4c171131247587b050f18f23596ca836d23b38633d0ead54f

  • SSDEEP

    12288:qMrey90koQ8L7+98mm4F0LROqfsiSIwjBdpL6uGGjWAxI9gAFGN6FWhMm:MyxkO8b42dvfCjBT2GjLI9z1Whb

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

muse

C2

176.113.115.145:4125

Attributes
  • auth_value

    b91988a63a24940038d9262827a5320c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6ffa7074b4b0bcda78e5649a60a25f48f80cbb6d71341eba9e33699a3450609.exe
    "C:\Users\Admin\AppData\Local\Temp\c6ffa7074b4b0bcda78e5649a60a25f48f80cbb6d71341eba9e33699a3450609.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3656
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un578923.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un578923.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1580
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1214.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1214.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2892
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2892 -s 1080
          4⤵
          • Program crash
          PID:3728
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7795.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7795.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4268
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 1348
          4⤵
          • Program crash
          PID:4104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si888346.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si888346.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4224
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2892 -ip 2892
    1⤵
      PID:928
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4268 -ip 4268
      1⤵
        PID:4440

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si888346.exe

        Filesize

        175KB

        MD5

        b8f7d3bd6dc98a5e793372cdebef597c

        SHA1

        7af8430b241576c8aaee0bab1c1b42be0a3e2956

        SHA256

        c87e3a64e21f1ebfee46dd1ec7d7c12792bfaeea8da6a6ed3b82111197b6ccd6

        SHA512

        c769b5ee2c9d222a4bd5cb3b10dc0bf5e8527148d9daa96dc016147d6dd6a2bc5ab0548817c59d989bb573740d3ca6cd3c4c6d5e104115cdbb3cf559e7cf1b0a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si888346.exe

        Filesize

        175KB

        MD5

        b8f7d3bd6dc98a5e793372cdebef597c

        SHA1

        7af8430b241576c8aaee0bab1c1b42be0a3e2956

        SHA256

        c87e3a64e21f1ebfee46dd1ec7d7c12792bfaeea8da6a6ed3b82111197b6ccd6

        SHA512

        c769b5ee2c9d222a4bd5cb3b10dc0bf5e8527148d9daa96dc016147d6dd6a2bc5ab0548817c59d989bb573740d3ca6cd3c4c6d5e104115cdbb3cf559e7cf1b0a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un578923.exe

        Filesize

        556KB

        MD5

        9e8e2560dd5b9d641fbaf20dd8176909

        SHA1

        8118579114fd57b74654942de04db8b20eb04274

        SHA256

        6d1e9520b05197026c3231f10f0a25458880d0b71ecdfb5ac978e96943466ed8

        SHA512

        ab48726771292fa7e74918dd8be9369e53fb081861aa1f23739e8fb38c4581a9fe2e8e61f39bab741c204d6817a33b6744a2ffdfbbefd26fc2e4089456cd7e8d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un578923.exe

        Filesize

        556KB

        MD5

        9e8e2560dd5b9d641fbaf20dd8176909

        SHA1

        8118579114fd57b74654942de04db8b20eb04274

        SHA256

        6d1e9520b05197026c3231f10f0a25458880d0b71ecdfb5ac978e96943466ed8

        SHA512

        ab48726771292fa7e74918dd8be9369e53fb081861aa1f23739e8fb38c4581a9fe2e8e61f39bab741c204d6817a33b6744a2ffdfbbefd26fc2e4089456cd7e8d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1214.exe

        Filesize

        347KB

        MD5

        1f68c1a332369bea896904fe5c07cc3e

        SHA1

        1a8ae8217067134cb7a627721b935da81076da5b

        SHA256

        576fd93ff7a6b4e0721accf67ba662749837ff067650eb172825e31eed95f003

        SHA512

        b9f3054d93a5614ea3b318154c56f92a5a422e0a034231216d859cccdae68b33f022173a6cf044847f385069c0d9bf012a5418a39ef7b8603b90e373e1107cc1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1214.exe

        Filesize

        347KB

        MD5

        1f68c1a332369bea896904fe5c07cc3e

        SHA1

        1a8ae8217067134cb7a627721b935da81076da5b

        SHA256

        576fd93ff7a6b4e0721accf67ba662749837ff067650eb172825e31eed95f003

        SHA512

        b9f3054d93a5614ea3b318154c56f92a5a422e0a034231216d859cccdae68b33f022173a6cf044847f385069c0d9bf012a5418a39ef7b8603b90e373e1107cc1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7795.exe

        Filesize

        406KB

        MD5

        2d3b2a55db8543c9af06def2a89a3b43

        SHA1

        56f5f6c5d545d0ed49995cdd8380832b6115f7a8

        SHA256

        4d39c60e65bc1b9ae22ea82949a61927a25ad4860cb919169aefa2f5adda16a5

        SHA512

        989ad28a94bc5d7326572c4f6edd12325529659c53365033986cd14fa9f865793060f3c1f3e2383fd9f260e7f332deb44556bf849dee7957a5a086f08635ebc2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7795.exe

        Filesize

        406KB

        MD5

        2d3b2a55db8543c9af06def2a89a3b43

        SHA1

        56f5f6c5d545d0ed49995cdd8380832b6115f7a8

        SHA256

        4d39c60e65bc1b9ae22ea82949a61927a25ad4860cb919169aefa2f5adda16a5

        SHA512

        989ad28a94bc5d7326572c4f6edd12325529659c53365033986cd14fa9f865793060f3c1f3e2383fd9f260e7f332deb44556bf849dee7957a5a086f08635ebc2

      • memory/2892-161-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2892-171-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2892-150-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2892-151-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2892-153-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2892-155-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2892-157-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2892-159-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2892-148-0x0000000002C60000-0x0000000002C8D000-memory.dmp

        Filesize

        180KB

      • memory/2892-163-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2892-165-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2892-167-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2892-169-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2892-149-0x00000000073A0000-0x0000000007944000-memory.dmp

        Filesize

        5.6MB

      • memory/2892-173-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2892-175-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2892-177-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2892-178-0x0000000007390000-0x00000000073A0000-memory.dmp

        Filesize

        64KB

      • memory/2892-179-0x0000000007390000-0x00000000073A0000-memory.dmp

        Filesize

        64KB

      • memory/2892-180-0x0000000007390000-0x00000000073A0000-memory.dmp

        Filesize

        64KB

      • memory/2892-181-0x0000000000400000-0x0000000002B84000-memory.dmp

        Filesize

        39.5MB

      • memory/2892-183-0x0000000007390000-0x00000000073A0000-memory.dmp

        Filesize

        64KB

      • memory/2892-182-0x0000000007390000-0x00000000073A0000-memory.dmp

        Filesize

        64KB

      • memory/2892-184-0x0000000007390000-0x00000000073A0000-memory.dmp

        Filesize

        64KB

      • memory/2892-186-0x0000000000400000-0x0000000002B84000-memory.dmp

        Filesize

        39.5MB

      • memory/4224-1121-0x0000000000180000-0x00000000001B2000-memory.dmp

        Filesize

        200KB

      • memory/4224-1122-0x00000000049F0000-0x0000000004A00000-memory.dmp

        Filesize

        64KB

      • memory/4268-192-0x00000000071C0000-0x00000000071D0000-memory.dmp

        Filesize

        64KB

      • memory/4268-223-0x0000000007780000-0x00000000077BF000-memory.dmp

        Filesize

        252KB

      • memory/4268-195-0x0000000007780000-0x00000000077BF000-memory.dmp

        Filesize

        252KB

      • memory/4268-194-0x0000000007780000-0x00000000077BF000-memory.dmp

        Filesize

        252KB

      • memory/4268-197-0x0000000007780000-0x00000000077BF000-memory.dmp

        Filesize

        252KB

      • memory/4268-199-0x0000000007780000-0x00000000077BF000-memory.dmp

        Filesize

        252KB

      • memory/4268-201-0x0000000007780000-0x00000000077BF000-memory.dmp

        Filesize

        252KB

      • memory/4268-203-0x0000000007780000-0x00000000077BF000-memory.dmp

        Filesize

        252KB

      • memory/4268-205-0x0000000007780000-0x00000000077BF000-memory.dmp

        Filesize

        252KB

      • memory/4268-207-0x0000000007780000-0x00000000077BF000-memory.dmp

        Filesize

        252KB

      • memory/4268-209-0x0000000007780000-0x00000000077BF000-memory.dmp

        Filesize

        252KB

      • memory/4268-211-0x0000000007780000-0x00000000077BF000-memory.dmp

        Filesize

        252KB

      • memory/4268-213-0x0000000007780000-0x00000000077BF000-memory.dmp

        Filesize

        252KB

      • memory/4268-215-0x0000000007780000-0x00000000077BF000-memory.dmp

        Filesize

        252KB

      • memory/4268-217-0x0000000007780000-0x00000000077BF000-memory.dmp

        Filesize

        252KB

      • memory/4268-219-0x0000000007780000-0x00000000077BF000-memory.dmp

        Filesize

        252KB

      • memory/4268-221-0x0000000007780000-0x00000000077BF000-memory.dmp

        Filesize

        252KB

      • memory/4268-193-0x00000000071C0000-0x00000000071D0000-memory.dmp

        Filesize

        64KB

      • memory/4268-225-0x0000000007780000-0x00000000077BF000-memory.dmp

        Filesize

        252KB

      • memory/4268-227-0x0000000007780000-0x00000000077BF000-memory.dmp

        Filesize

        252KB

      • memory/4268-1100-0x0000000007900000-0x0000000007F18000-memory.dmp

        Filesize

        6.1MB

      • memory/4268-1101-0x0000000007F80000-0x000000000808A000-memory.dmp

        Filesize

        1.0MB

      • memory/4268-1102-0x00000000080C0000-0x00000000080D2000-memory.dmp

        Filesize

        72KB

      • memory/4268-1103-0x00000000080E0000-0x000000000811C000-memory.dmp

        Filesize

        240KB

      • memory/4268-1104-0x00000000071C0000-0x00000000071D0000-memory.dmp

        Filesize

        64KB

      • memory/4268-1106-0x00000000083D0000-0x0000000008462000-memory.dmp

        Filesize

        584KB

      • memory/4268-1107-0x0000000008470000-0x00000000084D6000-memory.dmp

        Filesize

        408KB

      • memory/4268-1109-0x00000000071C0000-0x00000000071D0000-memory.dmp

        Filesize

        64KB

      • memory/4268-1108-0x00000000071C0000-0x00000000071D0000-memory.dmp

        Filesize

        64KB

      • memory/4268-1110-0x00000000071C0000-0x00000000071D0000-memory.dmp

        Filesize

        64KB

      • memory/4268-1111-0x0000000008C70000-0x0000000008CE6000-memory.dmp

        Filesize

        472KB

      • memory/4268-1112-0x0000000008D00000-0x0000000008D50000-memory.dmp

        Filesize

        320KB

      • memory/4268-191-0x0000000002DD0000-0x0000000002E1B000-memory.dmp

        Filesize

        300KB

      • memory/4268-1113-0x0000000008D70000-0x0000000008F32000-memory.dmp

        Filesize

        1.8MB

      • memory/4268-1114-0x0000000008F50000-0x000000000947C000-memory.dmp

        Filesize

        5.2MB

      • memory/4268-1115-0x00000000071C0000-0x00000000071D0000-memory.dmp

        Filesize

        64KB